 | Enterprise Network Management iPost: Implementing Continuous Risk Monitoring at the Department of State Post is the custom application that continuously monitors and reports risk on the it infrastructure at the Department of State (DoS) 93.61 Kb. 1 | read |
 | Title Software based Remote Attestation: measuring integrity of user applications and kernels Authors Title Software based Remote Attestation: measuring integrity of user applications and kernels 135.21 Kb. 3 | read |
 | Computer viruses Origins People create viruses. A person has to write the code, test it to make sure it spreads properly and then release the virus. A person also designs the virus's attack phase, whether it's a silly message or destruction of a hard disk 7.14 Kb. 1 | read |
 | Chapter 4 Computers This chapter is designed to invite your attention to a very wide range of possibilities for journalistic applications. As background for that broad spectrum, we shall now indulge in a little bit of nostalgia 81.57 Kb. 1 | read |
 | Computer Basics What is a computer A computer makes decisions based on simple comparisons such as one number being larger than another. Although the computer can help solve a tremendous variety of problems, it is simply a machine. It cannot solve problems on its own 24.28 Kb. 1 | read |
 | Computer hackers Text 1 In the 1950 and 1960s, hackers were motivated more by a desire to learn the operating characteristics of a computer than by any malicious intent 13.35 Kb. 1 | read |
 | The civilian years Except for a small number of us, we spent more time in our working lives as civilians than in uniform. More importantly, our classmates’ achievements as civilians rivaled our classmates’ achievements as military leaders 366.1 Kb. 11 | read |
 | Answers to End-of-Chapter Questions What component of a computer is located in the system unit and contains the circuitry to connect the computer to a network? 44.83 Kb. 1 | read |
 | Computers Inside & Out1 Everybody needs to know something about computers. In this tutorial, we provide an overview of what makes computers tick. After reading this tutorial, you should be able to 72.96 Kb. 1 | read |
 | The evolution of gaming computers The new Windows Vista will be made specifically to run directly from the gpu, to run faster, a fact learned from gaming. Without pc gaming computers as a whole would not have made all their new technologies 48.28 Kb. 1 | read |
 | Introduction a. The Apple iPhone Apple’s os X in a Unix Kernel. The iPhone combines smart phone capabilities with a simple to use graphical interface projected on a large ‘multi-touch’ display 50.52 Kb. 1 | read |
 | Computer Secondary Components These components are important to your computer, but are not as central and necessary as the Core Components 27.31 Kb. 1 | read |
 | Installing BizTalk Server 2010 on Windows 7 and Windows Vista Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property 191.07 Kb. 5 | read |
 | Is Windows xp professional x64 Edition Right for Me? White Paper Charlie Russel Author of Microsoft Windows Server 2003 Administrator’s Companion 2nd Edition 80.87 Kb. 1 | read |
 | It needs to be at least 7 slides. Keep in mind that you do not I have outlined the Virus section for you to be a help of how to do the rest of the article 40.27 Kb. 1 | read |